From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from esa.microchip.iphmx.com (esa.microchip.iphmx.com [68.232.154.123]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C0B4528ED for ; Thu, 23 Feb 2023 14:42:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=microchip.com; i=@microchip.com; q=dns/txt; s=mchp; t=1677163367; x=1708699367; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=EbDA6i5W8/Ks2Oq6NeDB98gZwwYHaiY1VdNVTzntjoU=; b=NAUKmYza9wL+FFbE/APXY1zdpDdqR6CL+WnnyA4B8//ZALDcj1Kq5QBl uuilS/IS/ALdUKvAxltgafAIiTQqhVFDMhZhs2pnx3MSYIIn/irOmLdal GN2xF3E1wCpIOdvsgcJWxIqwBHhFnApJg/gDaTJcsZz95r3DX2b/BT1HN aoW9NlIcp3PdwDGvdCrtUSh3xDUMpZFZAO+3dX1M+QClLIc7PnPOr15/E PR+mt5VVSdW7aL640c4OFcZ1R4ep41PeBC2KApWQMe3ocCxoZmOA9fthp 1wPasZyiN40ODWHPXZPcgevMmA8zgXJcyk4OtBEmyqfLUM5/Q1C36FRvU A==; X-IronPort-AV: E=Sophos;i="5.97,320,1669100400"; d="asc'?scan'208";a="138728596" Received: from unknown (HELO email.microchip.com) ([170.129.1.10]) by esa6.microchip.iphmx.com with ESMTP/TLS/AES256-SHA256; 23 Feb 2023 07:41:37 -0700 Received: from chn-vm-ex02.mchp-main.com (10.10.85.144) by chn-vm-ex01.mchp-main.com (10.10.85.143) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16; Thu, 23 Feb 2023 07:41:37 -0700 Received: from wendy (10.10.115.15) by chn-vm-ex02.mchp-main.com (10.10.85.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16 via Frontend Transport; Thu, 23 Feb 2023 07:41:35 -0700 Date: Thu, 23 Feb 2023 14:41:08 +0000 From: Conor Dooley To: Greg Kroah-Hartman CC: , , , , , , , , , , , , , , Subject: Re: [PATCH 6.1 00/46] 6.1.14-rc1 review Message-ID: References: <20230223130431.553657459@linuxfoundation.org> Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="k1PtNLss35S7tRv2" Content-Disposition: inline In-Reply-To: --k1PtNLss35S7tRv2 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu, Feb 23, 2023 at 03:37:54PM +0100, Greg Kroah-Hartman wrote: > On Thu, Feb 23, 2023 at 02:33:13PM +0000, Conor Dooley wrote: > > On Thu, Feb 23, 2023 at 02:06:07PM +0100, Greg Kroah-Hartman wrote: > > > This is the start of the stable review cycle for the 6.1.14 release. > > > There are 46 patches in this series, all will be posted as a response > > > to this one. If anyone has any issues with these being applied, plea= se > > > let me know. > > >=20 > > > Responses should be made by Sat, 25 Feb 2023 13:04:16 +0000. > > > Anything received after that time might be too late. > > >=20 > > > The whole patch series can be found in one patch at: > > > https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.1= =2E14-rc1.gz > > > or in the git tree and branch at: > > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc= =2Egit linux-6.1.y > > > and the diffstat can be found below. > >=20 > > > Dave Hansen > > > uaccess: Add speculation barrier to copy_from_user() > >=20 > > This breaks the build for me on RISC-V, you need to take f3dd0c53370e > > ("bpf: add missing header file include") from Linus' tree. > > It was broken in mainline too, so it is probably broken everywhere you > > backported it :( >=20 > Already fixed up and in -rc2. Cool, I'll go restart my CI jobs then. Thanks. --k1PtNLss35S7tRv2 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEABYIAB0WIQRh246EGq/8RLhDjO14tDGHoIJi0gUCY/d7BAAKCRB4tDGHoIJi 0gp4AQDiJObDn5QPwIS5KeggKGrf7gUi3W7G0JzsWLZu3/tCyAEA6mBgJqi0yVe6 Kcbi/A+QqyrOl7kXAmb1YgzsK547SAg= =p7ri -----END PGP SIGNATURE----- --k1PtNLss35S7tRv2--